Results 51 to 60 of about 6,594 (201)
Model checking of trusted cryptographic module
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj +2 more sources
Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili+2 more
wiley +1 more source
Analysis of cyberspace security based on game theory
Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and
Jian-ming ZHU, Qin WANG
doaj +3 more sources
Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi+6 more
wiley +1 more source
Expert Consensus‐Based Technical Guidelines for Remote Robotic‐Assisted Surgery and Procedures
Remote robotic‐assisted surgery and procedures offer significant potential to enhance access to surgical expertise, optimize patient outcomes, improve healthcare efficiency, reduce costs, and increase patient and provider satisfaction, aligning with the quintuple aim.
Yulun Wang+9 more
wiley +1 more source
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj +1 more source
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha+3 more
doaj +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha+9 more
wiley +1 more source
Formal verification for a PMQTT protocol
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam+3 more
doaj
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis+7 more
wiley +1 more source